EP4027684A1 - Procédé de configuration de service, dispositif de communication et système de communication - Google Patents

Procédé de configuration de service, dispositif de communication et système de communication Download PDF

Info

Publication number
EP4027684A1
EP4027684A1 EP20867686.6A EP20867686A EP4027684A1 EP 4027684 A1 EP4027684 A1 EP 4027684A1 EP 20867686 A EP20867686 A EP 20867686A EP 4027684 A1 EP4027684 A1 EP 4027684A1
Authority
EP
European Patent Office
Prior art keywords
information
policy
request message
network element
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP20867686.6A
Other languages
German (de)
English (en)
Other versions
EP4027684A4 (fr
Inventor
Changqi LU
Hui DING
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of EP4027684A1 publication Critical patent/EP4027684A1/fr
Publication of EP4027684A4 publication Critical patent/EP4027684A4/fr
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/20Communication route or path selection, e.g. power-based or shortest path routing based on geographic position or location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed

Definitions

  • This application relates to the communication field, and more specifically, to a service configuration method, a communication apparatus, and a communication system.
  • a user routing selection policy should support an edge computing service.
  • the edge computing service may be simply understood as that an application function (application function, AF) may choose to dynamically deploy an application service at an edge position.
  • an application function application function, AF
  • AF application function
  • a live or playback service may be deployed for a stadium during a major event, to implement functions such as switching viewing angles and playing back highlights by audiences in the stadium, thereby improving viewing experience of users.
  • the service may be allowed to be accessed only by users in a neighboring area.
  • a terminal device When accessing a specific service, a terminal device needs to select a correct protocol data unit (protocol data unit, PDU) session configuration parameter according to a URSP rule, to access a specific application service and obtain corresponding quality of service assurance.
  • protocol data unit protocol data unit
  • PDU protocol data unit
  • This application provides a service configuration method, a communication apparatus, and a communication system, to effectively configure a URSP in a scenario in which an application service is dynamically deployed, and avoid unnecessary signaling overheads.
  • a service configuration method includes: An access management network element receives a first configuration request message from a network exposure network element, where the first configuration request message includes first area information, and the first area information is used to indicate a target area; if a target terminal device is located in the target area, the access management network element sends a user policy association request message to a policy control network element, where the user policy association request message is used to request the policy control network element to configure a first user routing selection policy URSP for the target terminal device, and the first URSP is used by the target terminal device to access a first service; and the access management network element receives the first URSP from the policy control network element, and sends the first URSP to the target terminal device.
  • the policy control network element configures the first URSP for the target terminal device only when the target terminal device is located in the target area, so that the target terminal device can access a corresponding service based on the first URSP only when the target terminal device is located in the target area.
  • the first configuration request message and the user policy association request message each further include an application identifier, and the application identifier is used to indicate an application that provides the first service.
  • the application identifier may be an application service provider (application service Provider, ASP) identifier (identifier, ID), and an application service provider ASP indicated by the ASP ID provides the first service.
  • the application identifier may be an application service identifier (AF Service Identifier), or may be specific application identification information.
  • the first configuration request message further includes one or more of the following: an internal group identifier, traffic descriptor information, time window information, an internal transaction identifier, a data network name (data network name, DNN), and single-network slice selection assistance information (single-network slice selection assistance information, S-NSSAI).
  • the user policy association request message further includes one or more of the following: the traffic descriptor information, the time window information, the first area information, the data network name DNN, and the single-network slice selection assistance information S-NSSAI.
  • the internal group identifier is used to indicate all target terminal devices that are allowed to access the first service; the traffic descriptor information is used to describe the first service; the time window information is used to indicate availability time of the first service; the internal transaction identifier is used to identify a configuration request for the first service; and the DNN and the S-NSSAI are determined by the network exposure network element based on the application identifier.
  • the access management network element may provide information used to generate the first URSP, so that the policy control network element may generate the URSP based on the information provided by the access management network element.
  • the first configuration request message and the user policy association request message each include an application identifier and an internal transaction identifier, or the first configuration request message and the user policy association request message each include an internal transaction identifier.
  • the application identifier is used to indicate an application that provides the first service
  • the internal transaction identifier is used to identify a configuration request for the first service.
  • the policy control network element may obtain, locally or from a data storage network element based on the application identifier and the internal transaction identifier or based on the internal transaction identifier, information used to generate the URSP, and the policy control network element may generate the URSP based on the obtained information.
  • the access management network element may further compare current location information of each terminal device served by the access management network element with the first area information, to determine a terminal device in the target area.
  • a service configuration method includes: A policy control network element receives a user policy association request message from an access management network element, where the user policy association request message includes an application identifier, and the application identifier is used to indicate an application that provides a first service; the policy control network element generates a first user routing selection policy URSP based on the user policy association request message, where the first URSP is used by a target terminal device to access the first service; and the policy control network element sends the first URSP to the target terminal device.
  • the policy control network element may send the first URSP to a terminal device by using the access management network element.
  • the policy control network element configures the first URSP for the target terminal device only when the target terminal device is located in a target area, so that the target terminal device can access a corresponding service based on the first URSP only when the target terminal device is located in the target area.
  • the user policy association request message further includes one or more of the following: traffic descriptor information, time window information, first area information, a data network name DNN, and single-network slice selection assistance information S-NSSAI.
  • the traffic descriptor information is used to describe the first service; the time window information is used to indicate availability time of the first service; the first area information is used to indicate the target area; and the DNN and the S-NSSAI are determined based on the application identifier.
  • a service configuration method includes: A policy control network element obtains policy configuration information, where the policy configuration information includes an application identifier, and the application identifier is used to indicate an application that provides a first service; the policy control network element receives a user policy association request message from an access management network element, where the user policy association request message is used to request the policy control network element to configure a first user routing selection policy URSP for a target terminal device, the first URSP is used by the target terminal device to access the first service, and the target terminal device is located in a target area; the policy control network element generates the first URSP based on the policy configuration information; and the policy control network element sends the first URSP to the target terminal device.
  • the policy control network element may send the first URSP to a terminal device by using the access management network element.
  • the policy control network element may obtain the policy configuration information, and when the target terminal device is located in the target area, configure the first URSP for the target terminal device based on the policy configuration information, so that the target terminal device can access a corresponding service based on the first URSP only when the target terminal device is located in the target area.
  • a URSP in the solution of this application can be effectively configured, thereby avoiding unnecessary signaling overheads.
  • a policy control network element obtains policy configuration information includes: The policy control network element receives a policy configuration request message from a network exposure network element, where the policy configuration request message includes the policy configuration information, or the policy control network element obtains the policy configuration information from a data storage network element.
  • the policy configuration information is sent by the network exposure network element to the data storage network element.
  • the network exposure network element may configure the policy configuration information for the policy control network element.
  • the network exposure network element may configure the policy configuration information for the data storage network element, and the policy control network element may obtain the policy configuration information from the data storage network element.
  • the policy configuration information further includes one or more of the following: an internal group identifier, traffic descriptor information, time window information, an internal transaction identifier, first area information, a data network name DNN, and single-network slice selection assistance information S-NSSAI.
  • the internal group identifier is used to indicate all target terminal devices that are allowed to access the first service; the traffic descriptor information is used to describe the first service; the time window information is used to indicate availability time of the first service; the internal transaction identifier is used to identify a configuration request for the first service; the first area information is used to indicate the target area, and the target area is an area in which the target terminal device is allowed to access the first device; and the DNN and the S-NSSAI are determined based on the application identifier.
  • the user policy association request message includes the application identifier and/or the internal transaction identifier, and the internal transaction identifier is used to identify a configuration request for the first service.
  • a service configuration method includes: A policy control network element obtains policy configuration information, where the policy configuration information includes first area information and an application identifier, the first area information is used to indicate a target area, and the application identifier is used to indicate an application that provides a first service; the policy control network element receives location indication information from an access management network element; if determining that a target terminal device is located in the target area based on the location indication information, the policy control network element generates a first user routing selection policy URSP based on the policy configuration information; and the policy control network element sends the first URSP to the target terminal device, where the first URSP is used by the target terminal device to access the first service.
  • the location indication information is used to indicate a current location of the target terminal device, or the location indication information is used to indicate that the target terminal device enters or leaves the target area.
  • the access management network element may send the first URSP to a terminal device by using the access management network element.
  • the policy control network element may configure the first URSP for the target terminal device based on the policy configuration information, so that the target terminal device can access a corresponding service based on the first URSP only when the target terminal device is located in the target area.
  • a URSP in the solution of this application can be effectively configured, thereby avoiding unnecessary signaling overheads.
  • the policy configuration information further includes one or more of the following: an internal group identifier, traffic descriptor information, time window information, an internal transaction identifier, a data network name DNN, and single-network slice selection assistance information S-NSSAI.
  • the internal group identifier is used to indicate all target terminal devices that are allowed to access the first service; the traffic descriptor information is used to describe the first service; the time window information is used to indicate availability time of the first service; the internal transaction identifier is used to identify a configuration request for the first service; and the DNN and the S-NSSAI are determined based on the application identifier.
  • a policy control network element obtains policy configuration information includes: The policy control network element receives a first configuration request message from a network exposure network element, where the first configuration request message includes the policy configuration information, or the policy control network element obtains the policy configuration information from a data storage network element.
  • the policy configuration information is sent by the network exposure network element to the data storage network element.
  • the location indication information is used to indicate a current location of the target terminal device. That the policy control network element receives location indication information from an access management network element includes: The policy control network element receives a policy control request message from the access management network element, where the policy control request message includes the location indication information, and the policy control request message is a policy control establishment request message or a policy control update request message.
  • the location indication information is used to indicate that the target terminal device enters or leaves the target area; and before that the policy control network element receives location indication information from an access management network element, the method further includes: The policy control network element sends an event subscription request message to the access management network element, where the event subscription request message is used to indicate the target terminal device to send the location indication information to the policy control network element when the target terminal device enters or leaves the target area.
  • a service configuration method includes: An application network element generates a second configuration request message, where the second configuration request message includes an application identifier and second area information, the application identifier is used to indicate an application that provides a first service, the second area information is used to indicate a target area, and the second service configuration request message is used to configure a target terminal device in the target area to access the first service; and the application network element sends the second configuration request message to a network exposure network element.
  • the application network element configures the first service for the network exposure network element, so that the network exposure network element may send related configuration to a policy control network element, an access management network element, or a data storage network element, to enable the policy control network element to configure a first URSP for the target terminal device based on policy configuration information when the target terminal device is located in the target area.
  • the second configuration request message further includes one or more of the following: an external group identifier, traffic descriptor information, time window information, and an external transaction identifier.
  • the external group identifier is used to indicate a plurality of terminal devices that are allowed to access the first service, and the target terminal device is any one of the plurality of terminal devices;
  • the traffic descriptor information is used to describe a service flow of the first service;
  • the time window information is used to indicate availability time of the first service;
  • the external transaction identifier is used to identify the second service configuration request message.
  • a service configuration method includes: A network exposure network element receives a second configuration request message from an application network element, where the second configuration request message includes an application identifier and second area information, the application identifier is used to indicate an application that provides a first service, the second area information is used to indicate a target area, and the second configuration request message is used to configure a target terminal device in the target area to access the first service; and the network exposure network element generates a first configuration request message based on the second configuration request message, and sends the first configuration request message to an access management network element, where the first configuration request message includes first area information and the application identifier, the first area information is used to indicate the target area, and the first area information is determined based on the second area information.
  • the access management network element may request, based on the first configuration request message sent by the network exposure network element, a first URSP from a policy control network element.
  • the policy control network element may configure the first URSP for the target terminal device when the target terminal device is located in the target area, so that the target terminal device in the target area can access the first service.
  • the second configuration request message further includes one or more of the following: an external group identifier, traffic descriptor information, time window information, and an external transaction identifier.
  • the first configuration request message further includes one or more of the following: an internal group identifier, the traffic descriptor information, the time window information, an internal transaction identifier, a data network name DNN, and single-network slice selection assistance information S-NSSAI.
  • Both the external group identifier and the internal group identifier are used to indicate all target terminal devices that are allowed to access the first service, and the internal group identifier is determined based on the external group identifier; the traffic descriptor information is used to describe a service flow of the first service; the time window information is used to indicate availability time of the first service; and the external transaction identifier is used to identify the second configuration request message, the internal transaction identifier is used to identify the first configuration request message, and the internal transaction identifier is determined based on the external transaction identifier.
  • a service configuration method includes: A network exposure network element receives a second configuration request message from an application network element, where the second configuration request message includes an application identifier and second area information, the application identifier is used to indicate an application that provides a first service, the second area information is used to indicate a target area, and the second configuration request message is used to configure a target terminal device in the target area to access the first service; and the network exposure network element generates a first configuration request message and a policy configuration request message based on the second configuration request message, sends the policy configuration request message to a policy control network element or a data storage network element, and sends the first configuration request message to an access management network element, where the first configuration request message includes first area information, and the policy configuration request message includes the application identifier.
  • the access management network element may request, based on the first configuration request message sent by the network exposure network element, a first URSP from the policy control network element.
  • the policy control network element may generate and then configure the first URSP for the target terminal device based on the policy configuration request message, so that the target terminal device in the target area can access the first service.
  • the second configuration request message further includes one or more of the following: an external group identifier, traffic descriptor information, time window information, and an external transaction identifier.
  • the first configuration request message and/or the policy configuration request message further include/includes one or more of the following: an internal group identifier, the traffic descriptor information, the time window information, an internal transaction identifier, a data network name DNN, and single-network slice selection assistance information S-NSSAI.
  • Both the external group identifier and the internal group identifier are used to indicate all target terminal devices that are allowed to access the first service, and the internal group identifier is determined based on the external group identifier; the traffic descriptor information is used to describe a service flow of the first service; the time window information is used to indicate availability time of the first service; and the external transaction identifier is used to identify the second configuration request message, the internal transaction identifier is used to identify the first configuration request message, and the internal transaction identifier is determined based on the external transaction identifier.
  • a service configuration method includes: A network exposure network element receives a second configuration request message from an application network element, where the second configuration request message includes an application identifier and second area information, the application identifier is used to indicate an application that provides a first service, the second area information is used to indicate a target area, and the second configuration request message is used to configure a target terminal device in the target area to access the first service; and the network exposure network element generates a policy configuration request message based on the second configuration request message, and sends the policy configuration request message to a policy control network element, where the policy configuration request message includes first area information and the application identifier.
  • the policy control network element may generate and then configure a first URSP for the target terminal device based on the policy configuration request message, so that the target terminal device in the target area can access the first service.
  • the second configuration request message further includes one or more of the following: an external group identifier, traffic descriptor information, time window information, and an external transaction identifier.
  • the policy configuration request message further includes one or more of the following: an internal group identifier, the traffic descriptor information, the time window information, an internal transaction identifier, a data network name DNN, and single-network slice selection assistance information S-NSSAI.
  • Both the external group identifier and the internal group identifier are used to indicate all target terminal devices that are allowed to access the first service, and the internal group identifier is determined based on the external group identifier; the traffic descriptor information is used to describe a service flow of the first service; the time window information is used to indicate availability time of the first service; and the external transaction identifier is used to identify the second configuration request message, the internal transaction identifier is used to identify a first configuration request message, and the internal transaction identifier is determined based on the external transaction identifier.
  • a communication apparatus includes modules or units configured to perform the method according to any one of the first aspect to the eighth aspect and the possible implementations of the first aspect to the eighth aspect.
  • a communication apparatus includes a processor.
  • the processor is coupled to a memory, and may be configured to execute instructions in the memory, to implement the method according to any one of the first aspect to the eighth aspect and the possible implementations of the first aspect to the eighth aspect.
  • the communication apparatus further includes the memory.
  • the communication apparatus further includes a communication interface, and the processor is coupled to the communication interface.
  • a processor includes an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is configured to: receive a signal through the input circuit, and transmit the signal through the output circuit, to enable the processor to perform the method according to any one of the first aspect to the eighth aspect and the possible implementations of the first aspect to the eighth aspect.
  • the processor may be one or more chips
  • the input circuit may be an input pin
  • the output circuit may be an output pin
  • the processing circuit may be a transistor, a gate circuit, a trigger, various logic circuits, or the like.
  • An input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver
  • a signal output by the output circuit may be output to, for example, but not limited to, a transmitter and transmitted by the transmitter
  • the input circuit and the output circuit may be a same circuit, where the circuit is used as the input circuit and the output circuit at different moments.
  • Specific implementations of the processor and various circuits are not limited in embodiments of this application.
  • a processing apparatus includes a processor and a memory.
  • the processor is configured to: read instructions stored in the memory, receive a signal through a receiver, and transmit the signal through a transmitter, to perform the method according to any one of the first aspect to the eighth aspect and the possible implementations of the first aspect to the eighth aspect.
  • processors there are one or more processors, and there are one or more memories.
  • the memory may be integrated with the processor, or the memory and the processor are separately disposed.
  • the memory may be a non-transitory (non-transitory) memory, for example, a read-only memory (read-only memory, ROM).
  • the memory and the processor may be integrated into a same chip, or may be separately disposed on different chips.
  • a type of the memory and a manner of disposing the memory and the processor are not limited in embodiments of this application.
  • the processing apparatus in the twelfth aspect may be one or more chips.
  • the processor in the processing apparatus may be implemented by hardware, or may be implemented by software.
  • the processor When the processor is implemented by the hardware, the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor When the processor is implemented by the software, the processor may be a general-purpose processor, and is implemented by reading software code stored in the memory.
  • the memory may be integrated inside the processor, or may be located outside the processor and exist independently.
  • a computer program product includes a computer program (which may also be referred to as code or an instruction), and when the computer program is run, a computer is enabled to perform the method according to any one of the first aspect to the eighth aspect and the possible implementations of the first aspect to the eighth aspect.
  • a computer-readable storage medium stores a computer program (which may also be referred to as code or an instruction), and when the computer program is run on a computer, the computer is enabled to perform the method according to any one of the first aspect to the eighth aspect and the possible implementations of the first aspect to the eighth aspect.
  • a computer program which may also be referred to as code or an instruction
  • a communication system includes at least two network elements of the foregoing policy control network element, the access management network element, the data storage network element, the application network element, and the network exposure network element.
  • the communication system may further include the foregoing target terminal device.
  • the technical solutions in embodiments of this application may be applied to a 5th generation (5th generation, 5G) system or a new radio (new radio, NR) communication system, or may be applied to another communication system that may appear in the future, for example, a 6G communication system.
  • 5G 5th generation
  • NR new radio
  • FIG. 1 is a schematic diagram of a 5G system architecture.
  • the system architecture may include user equipment (user equipment, UE) 101, a radio access network (radio access network, RAN) network element 102, a policy control function (policy control function) 103, a data network (data network, DN) 104, an access and mobility management function (access and mobility management function, AMF) 105, a session management function (session management function, SMF) 106, a policy control function (policy control function, PCF) 107, an application function (application function, AF) 108, unified data management (unified data management, UDM) 109, a unified data repository (unified data repository, UDR) 110, and a network exposure function (network exposure function, NEF) 111.
  • network elements may be hardware devices, chips, software functions run on dedicated hardware, or virtualized functions instantiated on a platform (for example, a cloud platform). It should be further understood that some network elements shown in FIG. 1 may be deployed at a same location (for example, on a same hardware device or a software function), or may be separately deployed. This is not limited in this application.
  • the interface between the network elements shown in FIG. 1 is merely an example. In practice, the interface between the network elements may change. For example, the network elements may communicate with each other through a service-oriented interface.
  • the foregoing network elements such as the access management network element, the network exposure network element, the policy control network element, the application network element, and the data storage network element may have different names in different systems.
  • the access management network element may be an AMF in a 5G system, but may not be the AMF in a 6G system.
  • a person skilled in the art may understand that different names of the network elements shall not constitute any limitation on this application.
  • the access management network element is an AMF
  • the network exposure network element is an NEF
  • the policy control network element is a PCF
  • the application network element is an AF
  • the data storage network element is a UDR.
  • a URSP should support an edge computing service.
  • the edge computing service may be simply understood as that an AF may choose to dynamically deploy an application service at an edge position.
  • a live or playback service may be deployed for a stadium during a major event, to implement functions such as switching viewing angles and playing back highlights by audiences in the stadium, thereby improving viewing experience of users.
  • the service may be allowed to be accessed only by users in a neighboring area.
  • a terminal device When accessing a specific service, a terminal device needs to select a correct PDU session configuration parameter, for example, information such as DNN information or S-NSSAI, according to a URSP rule, to access a specific application service and obtain corresponding quality of service assurance.
  • a correct PDU session configuration parameter for example, information such as DNN information or S-NSSAI
  • URSP rule For the application service that is dynamically deployed, because any user may enter the area, if the URSP rule is configured for all users in advance, but a limited quantity of users actually need to access the service, signaling resources are wasted.
  • this application provides a service configuration method.
  • FIG. 2 is a schematic flowchart of a service configuration method according to this application. As shown in FIG. 2 , the method 200 may include S210 to S260. The following separately describes the steps.
  • An AMF determines, based on first area information, whether target UE is located in a target area.
  • the first area information is used to indicate the target area.
  • the first area information may be configured by an AF for the AMF by using an NEF.
  • the target UE may be any UE in a network, or may be some specific UEs.
  • the specific UEs may be configured by the AF for the AMF by using the NEF.
  • the AMF sends a user policy association request message to a PCF.
  • the user policy association request message is used to request the PCF to configure a first URSP for the target UE, and the first URSP is used by the target UE to access a first service.
  • the user policy association request message may be a user policy association establishment request message or a user policy association update request message.
  • the target UE is located in the target area may mean that the target UE enters the target area or the target UE is already located in the target area.
  • the PCF generates the first URSP.
  • the PCF may generate the first URSP based on an application identifier, where an application indicated by the application identifier provides the first service, or the application identifier is used to indicate an application that provides the first service.
  • the application identifier may be an application service provider (application service Provider, ASP) identifier (identifier, ID), and an application service provider ASP indicated by the ASP ID provides the first service.
  • the application identifier may be an application service identifier (AF Service Identifier), or may be specific application identification information.
  • the first URSP may include traffic descriptor (traffic descriptor, TD) information and route selection descriptor (route selection descriptor) information.
  • traffic descriptor traffic descriptor, TD
  • route selection descriptor route selection descriptor
  • the traffic descriptor information is used to describe a service flow of the first service, and may be an APP ID or an IP triplet (a destination address, a destination port number, and a protocol type) that corresponds to the first service, or may be domain name descriptor information or the like.
  • APP ID an IP triplet (a destination address, a destination port number, and a protocol type) that corresponds to the first service
  • domain name descriptor information or the like.
  • a traffic descriptor form in a URSP in a conventional technology.
  • the foregoing application identifier may be understood as a same concept between an operator and the ASP, while the APP ID herein may be understood as a same concept between the UE and the operator.
  • the APP ID may be a subapplication provided by the ASP.
  • the route selection descriptor information may include one or more of the following:
  • the user policy association request message may include the ASP ID.
  • the user policy association request message may further include one or more of the following: the traffic descriptor information, the time window information, the first area information, the DNN, and the S-NSSAI. That is, the AMF may provide the ASP ID and any one of the traffic descriptor information, the time window information, the first area information, the DNN, and the S-NSSAI.
  • the PCF may further determine the DNN and the S-NSSAI based on the ASP ID and/or the traffic descriptor information, and the configuration information of the local operator, or the configuration information in the UDR.
  • the PCF may obtain the ASP ID locally or from the UDR.
  • the PCF may further obtain the traffic descriptor information and/or the time window information locally or from the UDR, and may obtain the first area information locally, from the UDR, or from the AMF.
  • the foregoing information in the PCF and the foregoing information in the UDR are configured by the AF by using the NEF.
  • the NEF may map the ASP ID based on the configuration information of the local operator, to obtain the DNN and the S-NSSAI, so that the PCF may further obtain the DNN and the S-NSSAI from the NEF.
  • the PCF may obtain the DNN and the N-SSAI based on the ASP ID and/or the traffic descriptor information, and the configuration information of the local operator, or the configuration information in the UDR.
  • the AMF sends the user policy association request message to the PCF when the target UE is located in the target area. That is, if the target UE is located in the target area outside the time window indicated by the time window information, the AMF may not send the user policy association request message to the PCF.
  • the PCF does not need to determine whether time at which the AMF sends the user policy association request message falls within the time window.
  • the AMF may send the user policy association request message to the PCF only when the target UE is located in the target area.
  • the PCF may determine, based on time at which the user policy association request message is received, whether to perform S230. If the PCF receives the user policy association request message in the time window indicated by the time window information, the PCF performs S230; otherwise, the PCF does not perform S230. In addition, the PCF may not determine whether time at which the AMF sends the user policy association request message falls within the time window, while the UE determines, based on time window information in a URSP policy, whether to currently execute the first URSP policy.
  • the PCF sends the first URSP to the AMF
  • the AMF sends the first URSP to the target UE.
  • the PCF may send the first URSP to the UE by using the AMF through a UE configuration update (UE Configuration Update) process.
  • UE Configuration Update UE Configuration Update
  • the target UE accesses the first service based on the first URSP.
  • the target UE after receiving the first URSP, performs a URSP matching process when initiating the first service corresponding to the first URSP, matches the first URSP based on the traffic descriptor information corresponding to the first service, and then initiates a PDU session establishment process or a PDU session modification process based on the route selection descriptor information in the matched first URSP.
  • the PCF configures the first URSP for the UE only when the target UE is located in the target area, so that the target UE can access a corresponding service based on the first URSP only when the target UE is located in the target area.
  • the AMF when determining that the target UE is located in the target area, the AMF provides information used to generate the first URSP for the PCF.
  • a difference from the method shown in FIG. 3 lies in that, in the method shown in FIG. 4 , the NEF notifies the PCF of the information used to generate the first URSP, and in the method shown in FIG. 5A and FIG. 5B , the NEF notifies the UDR of the information used to generate the first URSP, and then the UDR provides the information for the PCF.
  • the method shown in FIG. 3 may correspond to the first manner described in S230, and the methods shown in FIG. 4 and FIG. 5A and FIG. 5B may correspond to the second manner described in S230.
  • FIG. 3 is a schematic flowchart of a service configuration method. As shown in FIG. 3 , the method 300 may include some or all of S301 to S314. The following separately describes the steps.
  • An AF sends a second configuration request message to an NEF.
  • the AF may send the second configuration request message in a case in which a new application is deployed.
  • a VR experience service is newly deployed in a virtual reality (virtual reality, VR) experience venue, and the second configuration request message is sent to allow a user in the venue to access and use the service by using a mobile phone.
  • the service needs to be accessed by using a specific DNN/specific S-NSSAI. That is, the AF needs to notify an operator to configure a corresponding URSP for a target user before the user accesses the experience service.
  • the AF may send the second configuration request message when an ASP adds a new application access point to a specific local access data network (local access data network, LADN).
  • LADN local access data network
  • the ASP adds the new application access point to the specific LADN, so that UE is allowed to access an application service through a local branch to reduce user plane path loopback.
  • the ASP can provide LADN information for the UE by using a URSP of an operator network, so that the UE can access the application service by using a correct LADN network.
  • the second service configuration request message is used to configure target UE in a target area to access a first service.
  • the second service configuration request message may include the foregoing ASP ID and information (denoted as second area information in this application) that is used to indicate the target area.
  • the second area information may be external geographic area information (Geo Info), but this is not limited in this application.
  • the second configuration request message may further carry an external group identifier, and the external group identifier is used to indicate all target UEs that are allowed to access the first service.
  • the target UE may be any UE in a network.
  • the second configuration request message may further include one or more of the following:
  • the NEF executes configuration authorization of the first service based on the second configuration request message.
  • the NEF determines, based on the ASP ID, whether the ASP indicated by the ASP ID allows sending the configuration request (that is, a first configuration request message) for the first service. If yes, the second area information is mapped to one or more of the following: internal location information of the operator network, a list of cell identifiers (List of Cell id(s)), list of RAN devices (List of gNodeB(s)), and a list of tracking area identifiers (tracking area identifiers, TAIs) (List of TAI(s)).
  • the foregoing information obtained by mapping the second area information may be collectively referred to as first area information. It is easy to understand that an area indicated by the first area information is the same as an area indicated by the second area information, that is, both the areas are target areas.
  • the NEF may further map the external group identifier to an internal group identifier (internal group identifier, IGI).
  • IGI internal group identifier
  • the NEF may further map the external transaction identifier to an internal transaction identifier (internal transaction identifier, ITI).
  • ITI internal transaction identifier
  • the NEF may further map the ASP ID to a DNN and S-NSSAI based on the configuration information of the operator.
  • the NEF obtains identification information of an AMF (or information about a set of AMFs) that provides a service for the target area.
  • the NEF may obtain through mapping the identification information of the AMF based on the second area information.
  • the NEF may send the first area information to UDM; and the UDM may determine, based on a mapping relationship between the first area information and an AMF identifier, the identification information of the AMF that provides the service for the area, and then the UDM may send the identification information of the AMF to the NEF.
  • the NEF sends the first configuration request message to the AMF identified by the identification information of the AMF.
  • the first configuration request message includes the ASP ID and the first area information.
  • the first configuration request message may further include the traffic descriptor information.
  • the first configuration request message may further include the time window information.
  • the second configuration request message includes the external transaction identifier
  • the first configuration request message may further include the internal transaction identifier.
  • the second configuration request message includes the external group identifier
  • the first configuration request message may further include the internal group identifier.
  • the first configuration request message may further include a DNN and S-NSSAI.
  • the NEF may be an intermediate NEF (Intermediate NEF, I-NEF) deployed in a visited network, or may be an NEF in a home network. If the NEF is the I-NEF deployed in the visited network, a process is basically the same as a process in a non-roaming scenario. If the NEF is the NEF in the home network, after the NEF sends the second configuration request message, the second configuration request message is forwarded to the AMF in the visited network by using the I-NEF.
  • I-NEF Intermediate NEF
  • the AMF stores the received first configuration request message.
  • the AMF sends a first response message to the NEF.
  • the first response message is used to indicate that the AMF successfully receives the first configuration request message.
  • the NEF sends a second response message to the AF.
  • the second response message is used to indicate that the NEF successfully receives the second configuration request message.
  • S306 and S307 are optional steps.
  • An execution sequence of S306 and S307 is not limited.
  • S307 may alternatively be performed before S302 or S303.
  • the AMF determines whether the target UE is located in the target area.
  • the AMF compares the first area information in the first configuration request message with current location information of the target UE served by the AMF. If one target UE is located in the target area, the AMF initiates a process shown in S309 to S314 for the target UE. Otherwise, the process is not initiated.
  • the AMF may alternatively initiate S309 to S314 for the target UE only when determining, in a time window indicated by the time window information, that the target UE is located in the target area.
  • the AMF when the AMF receives a handover request or a registration request message of the target UE before the time window indicated by the time window information ends, if the AMF determines that the target UE enters the target area, the AMF initiates the process shown in S309 to S314 for the target UE.
  • the handover request or the registration request received by the AMF includes the current location information of the target UE, for example, list of RAN devices/TAI information.
  • the AMF stores the information about the RAN device in which the UE served by the AMF is currently located or the TAI information.
  • the AMF sends a user policy association request message to a PCF.
  • the user policy association request message may include the ASP ID.
  • the user policy association request message may further include one or more of the following: the traffic descriptor information, the time window information, the first area information, the internal transaction identifier, the DNN, and the S-NSSAI.
  • S309 is specifically as follows: The AMF sends the user policy association request message to a V-PCF. In another manner, S309 is specifically as follows: The AMF sends the user policy association request message to a V-PCF, and then the V-PCF forwards the user policy association request message to an H-PCF. It should be understood that, in the roaming scenario, a PCF in a subsequent step may be the V-PCF or the H-PCF correspondingly.
  • the PCF sends a third response message to the AMF.
  • the third response message is used to indicate that the PCF successfully receives the user policy association request message. It should be understood that S310 is an optional step.
  • the PCF generates a first URSP based on the user policy association request message.
  • S312 to S314 are the same as S240 to S260, and reference may be made to S240 to S260.
  • the AF delivers the configuration request related to the first service to the AMF by using the NEF.
  • the AMF initiates, based on the configuration request, a user policy association request to the PCF for the target UE that enters the target area, so that the PCF may update a URSP on the target UE in a timely manner, to provide network guarantee for the target UE to access an application deployed in the target area.
  • FIG. 4 is a schematic flowchart of a service configuration method. As shown in FIG. 4 , the method 400 may include some or all of S401 to S417. The following separately describes the steps.
  • S401 and S402 are the same as S301 and S302, and reference may be made to S301 and S302.
  • the NEF sends a policy configuration request message to a PCF.
  • the policy configuration request message may include an ASP ID.
  • the policy configuration request message may further include one or more of the following: traffic descriptor information, time window information, first area information, an internal transaction identifier, a DNN, and S-NSSAI.
  • the policy configuration request message may be sent only to a PCF node in a current network (where in a roaming scenario, an I-NEF sends the policy configuration request message to a PCF node in a visited network, and in a non-roaming scenario, the NEF sends the policy configuration request message to a PCF node in a home network.)
  • the PCF stores received policy configuration information.
  • policy configuration information is content included in the policy configuration request message.
  • the PCF sends a fourth response message to the NEF.
  • the fourth response message is used to indicate that the PCF successfully receives the policy configuration request message.
  • S406 is the same as S303, and reference may be made to S303.
  • the NEF sends a first configuration request message to the AMF identified by identification information of the AMF.
  • Step S407 is similar to step S304. A difference lies in that, in S407, the first configuration request message may include first area information.
  • the first configuration request message may further include one or more of the following: the ASP ID, the traffic descriptor information, the time window information, the internal transaction identifier, the DNN, and the S-NSSAI.
  • the first configuration request message may include the ASP ID
  • the first configuration request message may include the internal transaction identifier, or may include both the ASP ID and the internal transaction identifier.
  • S408 to S410 are the same as S305 to S307, and reference may be made to S305 to S307.
  • the AMF determines whether target UE is located in a target area.
  • the AMF compares the first area information in the first configuration request message with current location information of the target UE served by the AMF. If one target UE is located in the target area, the AMF initiates a process shown in S412 to S417 for the target UE. Otherwise, the process is not initiated.
  • the AMF initiates S412 to S417 for the target UE only when determining, in a time window indicated by the time window information, that the target UE is located in the target area.
  • the AMF when the AMF receives a handover request or a registration request message of the target UE before the time window indicated by the time window information ends, if the AMF determines that the target UE enters the target area, the AMF initiates the process shown in S412 to S417 for the target UE.
  • the handover request or the registration request received by the AMF includes the current location information of the target UE, for example, information about a RAN device and/or TAI information.
  • the AMF stores the information about the RAN device in which the UE served by the AMF is currently located and/or the TAI information.
  • the AMF sends a user policy association request message to the PCF.
  • the user policy association request message may include the internal transaction identifier and/or the ASP ID.
  • the PCF may obtain the policy configuration information from locally stored information based on the internal transaction identifier and/or the ASP ID, so that the PCF may decide a URSP based on the policy configuration information and configuration information of a local operator, to generate a first URSP. It should be understood that if the PCF obtains the policy configuration information based on the internal transaction identifier, the policy configuration information further includes the internal transaction identifier.
  • the user policy association request message may further include one or more of the following: the time window information, the first area information, the internal transaction identifier, the DNN, and the S-NSSAI.
  • S412 is specifically as follows: The AMF sends the user policy association request message to a V-PCF. In another manner, S412 is specifically as follows: The AMF sends the user policy association request message to a V-PCF, and then the V-PCF forwards the user policy association request message to an H-PCF. It should be understood that, in the roaming scenario, a PCF in a subsequent step may be the V-PCF or the H-PCF correspondingly.
  • the PCF sends a third response message to the AMF.
  • the third response message is used to indicate that the PCF successfully receives the user policy association request message. It should be understood that S413 is an optional step.
  • the PCF generates the first URSP based on the user policy association request message and the stored policy configuration information.
  • S415 to S417 are the same as S240 to S260, and reference may be made to S240 to S260.
  • the AF delivers information (that is, the policy configuration information) required for deciding the URSP to a specific PCF node (or all PCF nodes in a network, or a PCF node that supports deciding an access and mobility policy) in an operator network by using the NEF, and delivers a service-related configuration request to the AMF.
  • the AMF initiates, based on the configuration request, a user policy association request to the PCF for the target UE that enters the target area, so that the PCF may update a URSP on the target UE in a timely manner, to provide network guarantee for the target UE to access an application deployed in the target area.
  • FIG. 5A and FIG. 5B are a schematic flowchart of a service configuration method. As shown in FIG. 5A and FIG. 5B , the method 500 may include some or all of S501 to S518. The following separately describes the steps.
  • S501 and S502 are the same as S301 and S302, and reference may be made to S301 and S302.
  • the NEF sends a policy configuration request message to a UDR.
  • the policy configuration request message may include an ASP ID.
  • the policy configuration request message may further include one or more of the following: traffic descriptor information, time window information, first area information, an internal transaction identifier, a DNN, and S-NSSAI.
  • the NEF may store content in the policy configuration request message, that is, policy configuration information, as application information (Application Data) in the UDR.
  • policy configuration information as application information (Application Data) in the UDR.
  • a PCF may obtain the policy configuration information from the UDR based on the internal transaction identifier or the ASP ID.
  • the UDR may push the policy configuration information to the PCF.
  • the PCF may store the policy configuration information for subsequent use.
  • the UDR stores the policy configuration information.
  • the UDR sends a fifth response message to the NEF.
  • the fifth response message is used to indicate that the UDR successfully receives the policy configuration request message. It should be understood that S505 is an optional step.
  • S506 to 511 are the same as S406 to S411, and reference may be made to S406 to S411.
  • S510 may be performed at any time after S501 or S502.
  • the AMF sends a user policy association request message to the PCF.
  • the user policy association request message may include the internal transaction identifier and/or the ASP ID.
  • the user policy association request message may further include one or more of the following: the time window information, the first area information, the internal transaction identifier, the DNN, and the S-NSSAI.
  • S512 is specifically as follows: The AMF sends the user policy association request message to a V-PCF. In another manner, S512 is specifically as follows: The AMF sends the user policy association request message to a V-PCF, and then the V-PCF forwards the user policy association request message to an H-PCF. It should be understood that, in the roaming scenario, a PCF in a subsequent step may be the V-PCF or the H-PCF correspondingly.
  • the PCF sends a third response message to the AMF.
  • the third response message is used to indicate that the PCF successfully receives the user policy association request message. It should be understood that S513 is an optional step.
  • the PCF obtains the policy configuration information from the UDR based on the user policy association request message.
  • the PCF may obtain the policy configuration information from the UDR based on the internal transaction identifier and/or the ASP ID, or the PCF may obtain, based on the internal transaction identifier and/or the ASP ID, the policy configuration information from the information pushed by the UDR to the PCF, and may further generate a first URSP based on the policy configuration information and configuration information of a local operator. It should be understood that if the PCF obtains the policy configuration information from the UDR based on the internal transaction identifier, the policy configuration information further includes the internal transaction identifier.
  • the PCF generates the first URSP based on the policy configuration information.
  • S516 to S518 are the same as S240 to S260, and reference may be made to S240 to S260.
  • the AF delivers the policy configuration information to the UDR by using the NEF, and delivers a service-related configuration request to the AMF.
  • the AMF initiates, based on the configuration request, a user policy association request to the PCF for target UE that enters the target area, so that the PCF may update a URSP on the target UE in a timely manner based on the policy configuration information obtained from the UDR, to provide network guarantee for the target UE to access an application deployed in the target area.
  • FIG. 6 shows another service configuration method according to this application.
  • the AMF determines whether target UE is located in the target area.
  • a PCF determines whether the target UE is located in the target area.
  • the method 600 may include some or all of S601 to S610. The following separately describes the steps.
  • S601 and S602 are the same as S301 and S302, and reference may be made to S301 and S302.
  • the NEF sends a policy configuration request message to all PCFs, some PCFs having a user policy decision function, or a PCF that supports providing a service for an area in a network.
  • the PCF After receiving the policy configuration request message, the PCF stores content in the policy configuration request message, that is, policy configuration information.
  • the policy configuration information includes first area information and an ASP ID.
  • the policy configuration request message may further include one or more of the following: traffic descriptor information, time window information, the first area information, an internal transaction identifier, a DNN, and S-NSSAI.
  • the NEF may alternatively send the policy configuration request message to a UDR.
  • the policy configuration information in the policy configuration request message needs to be first obtained from the UDR.
  • the PCF may obtain the policy configuration information from the UDR.
  • the UDR may actively push the policy configuration information to the PCF.
  • the NEF sends a second response message to the AF.
  • the second response message is used to indicate that the NEF successfully receives the second configuration request message.
  • S604 is an optional step.
  • the AMF sends location indication information to the PCF.
  • the location indication information is used to indicate a current location of target UE, or the location indication information is used to indicate that target UE enters or leaves a target area.
  • S605 may be specifically implemented in two manners.
  • the target UE When initiating a registration request and/or a handover request, the target UE sends a policy control request message to the PCF, where the policy control request message includes the location indication information.
  • the policy control request message is a policy control establishment request message or a policy control update request message.
  • the PCF may subscribe to a UE location change event from the AMF, for example, subscribe to an event that UE enters the target area. In this case, when the UE enters the target area, the AMF sends the location indication information to the PCF. Optionally, the PCF may only subscribe to a location change event of the target UE.
  • a process in which the PCF subscribes to the location change event of the target UE from the AMF may include: The PCF sends an event subscription request message to the AMF, where the event subscription request message is used to subscribe to the location change event of the target UE in the target area.
  • the AMF sends the location indication information to the PCF.
  • the PCF determines, based on the location indication information, whether the target UE is located in the target area.
  • S607 is performed; otherwise, S607 and subsequent steps are not performed.
  • the PCF generates a first URSP based on the policy configuration information.
  • the PCF may determine traffic descriptor information and user selection descriptor information based on the policy configuration information and local configuration information, to generate the first URSP.
  • S608 to S610 are the same as S240 to S260, and reference may be made to S240 to S260.
  • the AMF does not need to perceive a related configuration process of the first service, and the PCF directly determines, based on the location information provided by the AMF, whether the target UE is located in the target area. If the target UE is located in the target area, the PCF decides a user policy and provides an updated URSP policy rule for the target UE, to provide network guarantee for the target UE to access an application deployed in the target area.
  • FIG. 7 is a schematic block diagram of a communication apparatus according to an embodiment of this application.
  • a communication apparatus 700 may include a transceiver unit 710 and a processing unit 720.
  • the transceiver unit 710 may be configured to receive information (or a message) sent by another apparatus, and may be further configured to send the information (or the message) to the another apparatus. For example, the transceiver unit 710 sends or receives a user policy association request message.
  • the processing unit 720 may be configured to perform internal processing of the apparatus, for example, generate a first URSP.
  • the communication apparatus 700 may correspond to the AMF in the foregoing method embodiments.
  • the communication apparatus 1700 may be an AMF, or may be a chip in the AMF
  • the communication apparatus 700 may include units configured to perform operations performed by the AMF in the foregoing method embodiments, and the units in the communication apparatus 700 are separately configured to implement the operations performed by the AMF in the foregoing method embodiments.
  • the transceiver unit 710 may be configured to: receive a first configuration request message from a network exposure network element (for example, an NEF), where the first configuration request message includes first area information, and the first area information is used to indicate a target area; if the processing unit 720 determines that a target terminal device is located in the target area, send the user policy association request message to a policy control network element, where the user policy association request message is used to request the policy control network element to configure a first user routing selection policy URSP for the target terminal device, and the first URSP is used by the target terminal device to access a first service; and receive the first URSP from the policy control network element, and send the first URSP to the target terminal device (for example, target UE).
  • a network exposure network element for example, an NEF
  • the processing unit 720 determines that a target terminal device is located in the target area, send the user policy association request message to a policy control network element, where the user policy association request message is used to request the policy control network element to configure
  • the communication apparatus 700 may correspond to the PCF in the foregoing method embodiments.
  • the communication apparatus 700 may be a PCF, or may be a chip in the PCF.
  • the communication apparatus 700 may include units configured to perform operations performed by the PCF in the foregoing method embodiments, and the units in the communication apparatus 700 are separately configured to implement the operations performed by the PCF in the foregoing method embodiments.
  • the transceiver unit 710 is configured to receive the user policy association request message from an access management network element (for example, an AMF), where the user policy association request message includes an application identifier, and the application identifier is used to indicate an application that provides a first service; the processing unit 720 is configured to generate a first user routing selection policy URSP based on the user policy association request message, where the first URSP is used by a target terminal device to access the first service; and the transceiver unit 710 is further configured to send the first URSP to the target terminal device (for example, target UE).
  • an access management network element for example, an AMF
  • the processing unit 720 is configured to generate a first user routing selection policy URSP based on the user policy association request message, where the first URSP is used by a target terminal device to access the first service
  • the transceiver unit 710 is further configured to send the first URSP to the target terminal device (for example, target UE).
  • the transceiver unit 710 is configured to obtain policy configuration information, where the policy configuration information includes an application identifier, and the application identifier is used to indicate an application that provides a first service; the transceiver unit 710 is further configured to receive the user policy association request message from an access management network element (for example, an AMF), where the user policy association request message is used to request the apparatus to configure a first user routing selection policy URSP for a target terminal device (for example, target UE), the first URSP is used by the target terminal device to access the first service, and the target terminal device is located in a target area; the processing unit 720 is configured to generate the first URSP based on the policy configuration information; and the transceiver unit 710 is further configured to send the first URSP to the target terminal device.
  • an access management network element for example, an AMF
  • the user policy association request message is used to request the apparatus to configure a first user routing selection policy URSP for a target terminal device (for example, target UE), the first URS
  • the transceiver unit 710 is configured to obtain policy configuration information, where the policy configuration information includes first area information and an application identifier, the first area information is used to indicate a target area, and the application identifier is used to indicate an application that provides a first service; the transceiver unit 710 is further configured to receive location indication information from an access management network element; the processing unit 720 is configured to: if determining that a target terminal device is located in the target area based on the location indication information, generate a first user routing selection policy URSP based on the policy configuration information; and the transceiver unit 710 is further configured to send the first URSP to the target terminal device, where the first URSP is used by the target terminal device to access the first service.
  • the communication apparatus 700 may correspond to the NEF in the foregoing method embodiments.
  • the communication apparatus 700 may be an NEF, or may be a chip in the NEF.
  • the communication apparatus 700 may include units configured to perform operations performed by the NEF in the foregoing method embodiments, and the units in the communication apparatus 700 are separately configured to implement the operations performed by the NEF in the foregoing method embodiments.
  • the communication apparatus 700 may correspond to the AF in the foregoing method embodiments.
  • the communication apparatus 700 may be an AF, or may be a chip in the AF.
  • the communication apparatus 700 may include units configured to perform operations performed by the AF in the foregoing method embodiments, and the units in the communication apparatus 700 are separately configured to implement the operations performed by the AF in the foregoing method embodiments.
  • the communication apparatus 700 may correspond to the UDR in the foregoing method embodiments.
  • the communication apparatus 700 may be a UDR, or may be a chip in the UDR.
  • the communication apparatus 700 may include units configured to perform operations performed by the UDR in the foregoing method embodiments, and the units in the communication apparatus 700 are separately configured to implement the operations performed by the UDR in the foregoing method embodiments.
  • the communication apparatus 700 may correspond to the target UE in the foregoing method embodiments.
  • the communication apparatus 700 may be target UE, or may be a chip in the target UE.
  • the communication apparatus 700 may include units configured to perform operations performed by the target UE in the foregoing method embodiments, and the units in the communication apparatus 700 are separately configured to implement the operations performed by the target UE in the foregoing method embodiments.
  • the transceiver unit 710 in the communication apparatus 700 may correspond to a transceiver 2020 in a terminal device 2000 shown in FIG. 8
  • the processing unit 720 in the communication apparatus 700 may correspond to a processor 2010 in the terminal device 2000 shown in FIG. 8 .
  • the transceiver unit 710 in the communication apparatus 700 may be an input/output interface.
  • the transceiver unit 710 in the communication apparatus 700 may correspond to a communication interface 3010 shown in FIG. 9
  • the processing unit 720 may correspond to a processor 3020 shown in FIG. 9 .
  • FIG. 8 is a schematic diagram of a structure of a terminal device 2000 according to an embodiment of this application.
  • the terminal device 2000 may be used in the system shown in FIG. 1 , to perform a function of the target UE in the foregoing method embodiments.
  • the terminal device 2000 includes a processor 2010 and a transceiver 2020.
  • the terminal device 2000 further includes a memory 2030.
  • the processor 2010, the transceiver 2002, and the memory 2030 may communicate with each other through an internal connection path, to transfer a control signal or a data signal.
  • the memory 2030 is configured to store a computer program.
  • the processor 2010 is configured to invoke and run the computer program in the memory 2030, to control the transceiver 2020 to receive and send a signal.
  • the terminal device 2000 may further include an antenna 2040, configured to send, by using a radio signal, uplink data or uplink control signaling output by the transceiver 2020.
  • the processor 2010 and the memory 2030 may be integrated into one processing apparatus.
  • the processor 2010 is configured to execute program code stored in the memory 2030 to implement the foregoing functions.
  • the memory 2030 may alternatively be integrated into the processor 2010, or may be independent of the processor 2010.
  • the processor 2010 may correspond to the processing unit in FIG. 7 .
  • the transceiver 2020 may correspond to the transceiver unit in FIG. 7 .
  • the transceiver 2020 may include a receiver (or referred to as a receiver machine or a receiver circuit) and a transmitter (or referred to as a transmitter machine or a transmitter circuit).
  • the receiver is configured to receive a signal
  • the transmitter is configured to transmit a signal.
  • the terminal device 2000 shown in FIG. 8 can implement processes related to the target UE in any method embodiment in the foregoing method embodiments. Operations or functions of modules in the terminal device 2000 are intended to implement corresponding processes in the foregoing method embodiments. For details, refer to the descriptions in the foregoing method embodiments. To avoid repetition, detailed descriptions are properly omitted herein.
  • the processor 2010 may be configured to perform an action that is internally implemented by the target UE and that is described in the foregoing method embodiments, and the transceiver 2020 may be configured to perform an action that is sent by the target UE to another element or received from the another network element in the foregoing method embodiments.
  • the transceiver 2020 may be configured to perform an action that is sent by the target UE to another element or received from the another network element in the foregoing method embodiments.
  • the terminal device 2000 may further include a power supply 2050, configured to supply power to components or circuits in the terminal device.
  • the terminal device 2000 may further include one or more of an input unit 2060, a display unit 2070, an audio circuit 2080, a camera 2090, a sensor 2100, and the like.
  • the audio circuit may further include a speaker 2082, a microphone 2084, and the like.
  • FIG. 9 is a schematic diagram of a structure of a communication apparatus according to an embodiment of this application. It should be understood that the communication apparatus 3000 shown in FIG. 9 is merely an example. The communication apparatus in this embodiment of this application may further include other modules or units, may include modules having functions similar to those of modules in FIG. 9 , or may not necessarily include all modules in FIG. 9 .
  • the communication apparatus 3000 includes a communication interface 3010 and at least one processor 3020.
  • the communication apparatus 3000 may correspond to any network element of an AMF, a PCF, an AF, an NEF, and a UDR.
  • the at least one processor 3020 may be configured to perform an action that is internally implemented by a corresponding network element in the foregoing method embodiments, and the transceiver 2020 may be configured to perform an action that is sent by the corresponding network element to another network element or received from the another network element in the foregoing method embodiments.
  • the at least one processor 3020 executes program instructions, to enable the communication apparatus 3000 to implement a corresponding process of the method executed by a corresponding network element in the foregoing method embodiments.
  • the communication apparatus 3000 may further include a memory.
  • the memory may store program instructions, and the at least one processor 3020 may read the program instructions stored in the memory and execute the program instructions.
  • the processor in this embodiment of this application may be a central processing unit (Central Processing Unit, CPU), the processor may further be another general-purpose processor, a digital signal processor (digital signal processor, DSP), an application-specific integrated circuit (application-specific integrated circuit, ASIC), a field programmable gate array (field programmable gate array, FPGA) or another programmable logic device, a discrete gate or a transistor logic device, a discrete hardware component, or the like.
  • the general-purpose processor may be a microprocessor, or the processor may be any conventional processor or the like.
  • this application further provides a computer program product.
  • the computer program product includes computer program code.
  • the computer program code When the computer program code is run on a computer, the computer is enabled to perform the method corresponding to any network element in the foregoing method embodiments.
  • this application further provides a system, including at least one of the foregoing target UE, the AMF, the PCF, the AF, the NEF, and the UDR.
  • An embodiment of this application further provides a processing apparatus, including a processor and an interface.
  • the processor is configured to perform the method in any one of the foregoing method embodiments.
  • the processing apparatus may be a chip.
  • the processing apparatus may be a field programmable gate array (field programmable gate array, FPGA), may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application-specific integrated circuit (application-specific integrated circuit, ASIC), a field programmable gate array (field programmable gate array, FPGA) or another programmable logic device, a discrete gate or a transistor logic device, a discrete hardware component, a system on chip (system on chip, SoC), a central processing unit (central processing unit, CPU), a network processor (network processor, NP), a digital signal processing circuit (digital signal processing, DSP), a micro controller unit (micro controller unit, MCU), a programmable controller (programmable logic device, PLD) or another integrated chip.
  • FPGA field programmable gate array
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field programmable gate array
  • FPGA field programmable gate array
  • the processing apparatus may implement or perform methods, steps, and logical block diagrams that are disclosed in embodiments of this application.
  • the general-purpose processor may be a microprocessor, or the processor may be any conventional processor or the like. Steps of the methods disclosed with reference to embodiments of this application may be directly performed and completed by using a hardware decoding processor, or may be performed and completed by using a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a mature storage medium in the art, such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, an electrically erasable programmable memory, or a register. The storage medium is located in the memory, and the processor reads information in the memory and completes the steps of the foregoing method in combination with hardware of the processor.
  • the memory in embodiments of this application may be a volatile memory or a non-volatile memory, or may include both a volatile memory and a non-volatile memory.
  • the non-volatile memory may be a read-only memory (read-only memory, ROM), a programmable read-only memory (programmable ROM, PROM), an erasable programmable read-only memory (erasable PROM, EPROM), an electrically erasable programmable read-only memory (electrically EPROM, EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (random access memory, RAM), and is used as an external cache.
  • RAMs may be used, for example, a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), a synchronous dynamic random access memory (synchronous DRAM, SDRAM), a double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), an enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), a synchlink dynamic random access memory (synchlink DRAM, SLDRAM), and a direct rambus random access memory (direct rambus RAM, DR RAM).
  • static random access memory static random access memory
  • DRAM dynamic random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • double data rate SDRAM double data rate SDRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced synchronous dynamic random access memory
  • synchlink dynamic random access memory synchlink dynamic random access memory
  • direct rambus RAM direct rambus RAM
  • All or some of the foregoing embodiments may be implemented by using software, hardware, firmware, or any combination thereof.
  • the software is used to implement the embodiments, all or some of the embodiments may be implemented in a form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or another programmable apparatus.
  • the computer instructions may be stored in a computer-readable storage medium or may be transmitted from a computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, a computer, a server, or a data center to another website, computer, server, or data center in a wired (for example, a coaxial cable, an optical fiber, or a digital subscriber line (digital subscriber line, DSL)) or wireless (for example, infrared, radio, and microwave) manner.
  • the computer-readable storage medium may be any usable medium accessible by a computer, or a data storage device, for example, a server or a data center, integrating one or more usable media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), a semiconductor medium (for example, a solid state drive (solid state drive, SSD)), or the like.
  • a magnetic medium for example, a floppy disk, a hard disk, or a magnetic tape
  • an optical medium for example, a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state drive (solid state drive, SSD)
  • the network device and the terminal device in the foregoing apparatus embodiments completely correspond to the network device or terminal device in the method embodiments.
  • a corresponding module or unit performs a corresponding step.
  • a communication unit (a transceiver) performs a receiving or a sending step in the method embodiments
  • a processing unit a processor performs another step other than the sending or the receiving step.
  • a function of a specific unit refer to a corresponding method embodiment.
  • a component may be, but is not limited to, a process that is run on a processor, the processor, an object, an executable file, a thread of execution, a program, or a computer.
  • an application that runs on a computing device and the computing device may be components.
  • One or more components may reside within a process or a thread of execution, and a component may be located on one computer or distributed between two or more computers.
  • these components may be executed from various computer-readable media that store various data structures.
  • the components may communicate by using a local or remote process, for example, based on a signal having one or more data packets (for example, data from two components interacting with another component in a local system, a distributed system, or across a network such as the internet interacting with another system by using the signal).
  • a signal having one or more data packets (for example, data from two components interacting with another component in a local system, a distributed system, or across a network such as the internet interacting with another system by using the signal).
  • an embodiment mentioned in the entire specification means that particular features, structures, or characteristics related to the embodiment are included in at least one embodiment of this application. Therefore, the embodiments in the entire specification are not necessarily same embodiments. In addition, these particular features, structures, or characteristics may be combined in one or more embodiments in any proper manner.
  • B corresponding to A indicates that B is associated with A, and B may be determined based on A.
  • determining B based on A does not mean that B is determined based on only A.
  • B may alternatively be determined based on A and/or other information.
  • an expression used in this application similar to an expression that "an item includes one or more of the following: A, B, and C" usually means that the item may be any one of the following cases: A; B; C; A and B; A and C; B and C; A, B, and C; A and A; A, A, and A; A, A, and B; A, A, and C; A, B, and B; A, C, and C; B and B; B, B and B; B, B and C; C and C; C, C, and C; and another combination of A, B and C.
  • three elements A, B, and C are used as an example to describe an optional case of the item.
  • the terminal device and/or the network device may perform some or all steps in embodiments of this application. These steps or operations are merely examples. In embodiments of this application, other operations or variations of various operations may be further performed. In addition, the steps may be performed in a sequence different from a sequence presented in embodiments of this application, and not all the operations in embodiments of this application may be performed.
  • the disclosed system, the apparatus, and the method may be implemented in other manners.
  • the described apparatus embodiments are merely examples.
  • division into the units is merely logical function division.
  • a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed.
  • the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces, and the indirect couplings or communication connections between apparatuses or units may be implemented in an electronic form, a mechanical form, or another form.
  • Units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units. That is, the units may be located at one location, or may be distributed to a plurality of network units. Some or all of the units may be selected depending on an actual requirement to implement the objectives of the solutions of the embodiments.
  • function units in embodiments of this application may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units may be integrated into one unit.
  • the functions When the functions are implemented in a form of a software function unit and sold or used as an independent product, the functions may be stored in a computer-readable storage medium.
  • the computer software product is stored in a storage medium, and includes several instructions for instructing a computer device (which may be a personal computer, a server, or a network device) to perform all or some of the steps of the methods in embodiments of this application.
  • the foregoing storage medium includes any medium that can store program code, such as a USB flash drive, a removable hard disk, a read-only memory ROM, a random access memory RAM, a magnetic disk, or an optical disc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
EP20867686.6A 2019-09-26 2020-09-23 Procédé de configuration de service, dispositif de communication et système de communication Pending EP4027684A4 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910918864.4A CN112566149B (zh) 2019-09-26 2019-09-26 配置业务的方法、通信装置和通信系统
PCT/CN2020/117149 WO2021057794A1 (fr) 2019-09-26 2020-09-23 Procédé de configuration de service, dispositif de communication et système de communication

Publications (2)

Publication Number Publication Date
EP4027684A1 true EP4027684A1 (fr) 2022-07-13
EP4027684A4 EP4027684A4 (fr) 2023-01-25

Family

ID=75030017

Family Applications (1)

Application Number Title Priority Date Filing Date
EP20867686.6A Pending EP4027684A4 (fr) 2019-09-26 2020-09-23 Procédé de configuration de service, dispositif de communication et système de communication

Country Status (4)

Country Link
US (1) US20220217611A1 (fr)
EP (1) EP4027684A4 (fr)
CN (1) CN112566149B (fr)
WO (1) WO2021057794A1 (fr)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11622323B2 (en) * 2020-03-27 2023-04-04 Qualcomm Incorporated Slice allocation and interface to applications
CN115442792A (zh) * 2021-06-03 2022-12-06 华为技术有限公司 接入业务的方法、装置和系统
CN115499807A (zh) * 2021-06-18 2022-12-20 中兴通讯股份有限公司 网元配置方法、业务配置方法、网元、存储介质
CN113179518B (zh) * 2021-06-30 2021-10-26 中移(上海)信息通信科技有限公司 一种数据传输方法、数据传输装置、数据传输设备及终端
EP4277353A4 (fr) * 2021-07-19 2024-08-21 Tencent Tech Shenzhen Co Ltd Procédé et appareil de traitement de données de sport électronique, dispositif et support de stockage
CN115884134A (zh) * 2021-09-28 2023-03-31 华为技术有限公司 一种通信方法及通信装置
WO2023141167A1 (fr) * 2022-01-19 2023-07-27 Innopeak Technology, Inc. Prise en charge de transfert de données de groupe d'applications basé sur une politique de qualité de service de groupe
CN115460342B (zh) * 2022-07-29 2024-02-27 浙江大华技术股份有限公司 相机设备的业务设置方法、装置和多路相机联动系统
KR20240044916A (ko) * 2022-09-29 2024-04-05 삼성전자주식회사 무선 통신 시스템에서 제한된 pdu 세션에 대한 정책 제어를 위한 방법 및 장치

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638886B (zh) * 2011-02-14 2016-09-28 中兴通讯股份有限公司 小区位置信息提供方法、装置及系统
EP3167632A1 (fr) * 2014-07-11 2017-05-17 Telefonaktiebolaget LM Ericsson (publ) Procédé, système et dispositif destinés à demander des services sur un réseau mobile pour l'un d'une pluralité d'équipements utilisateurs mobiles.
KR102244049B1 (ko) * 2016-08-22 2021-04-26 삼성전자 주식회사 무선 통신 네트워크에서 지역별 데이터 네트워크 구성을 위한 방법 및 시스템
US10856131B2 (en) * 2017-01-16 2020-12-01 Lg Electronics Inc. Method for updating UE configuration in wireless communication system and apparatus for same
CN117793952A (zh) * 2017-08-11 2024-03-29 华为技术有限公司 一种通信方法及装置
WO2019035614A1 (fr) * 2017-08-14 2019-02-21 Samsung Electronics Co., Ltd. Procédé de traitement de fonction de plan utilisateur d'ancrage (upf) pour délestage local dans un réseau cellulaire 5g
US10701587B2 (en) * 2017-10-15 2020-06-30 Qualcomm Incorporated Policy provisioning at a user equipment (UE)
JP2021510044A (ja) * 2017-11-21 2021-04-08 オッポ広東移動通信有限公司Guangdong Oppo Mobile Telecommunications Corp., Ltd. 情報伝送方法、ネットワークデバイス及び端末デバイス
CN109862581B (zh) * 2017-11-30 2022-05-17 华为技术有限公司 一种通信方法及装置
CN110049533B (zh) * 2018-01-15 2020-12-22 华为技术有限公司 一种本地数据网络的指示方法及装置
CN110149675B (zh) * 2018-02-11 2020-12-04 大唐移动通信设备有限公司 一种upf选择方法和装置
US11019668B2 (en) * 2018-04-09 2021-05-25 Ofinno, Llc PDU session establishment for cellular IoT
US10506506B2 (en) * 2018-04-30 2019-12-10 Ofinno, Llc 5G policy control for restricted local operator services
US10524198B2 (en) * 2018-05-18 2019-12-31 Intel Corporation UE indication to PCF whether or not to send UE policy
US11044062B2 (en) * 2018-07-13 2021-06-22 Apple Inc. Methods to determine parameters related to phase tracking reference signals (PT-RS) based on a type of radio network temporary identifier (RNTI)
US11304092B2 (en) * 2018-09-12 2022-04-12 Ofinno, Llc Session packet duplication control
US10855851B2 (en) * 2018-09-13 2020-12-01 Ofinno, Llc Charging control with SMF
CN111988828B (zh) * 2018-11-23 2021-08-10 腾讯科技(深圳)有限公司 路由选择策略的获取方法、装置及设备
CN110247849A (zh) * 2019-05-28 2019-09-17 中国联合网络通信集团有限公司 Ursp的更新方法和装置
US20220330085A1 (en) * 2019-09-12 2022-10-13 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for flow control

Also Published As

Publication number Publication date
US20220217611A1 (en) 2022-07-07
CN112566149B (zh) 2023-04-28
WO2021057794A1 (fr) 2021-04-01
CN112566149A (zh) 2021-03-26
EP4027684A4 (fr) 2023-01-25

Similar Documents

Publication Publication Date Title
EP4027684A1 (fr) Procédé de configuration de service, dispositif de communication et système de communication
KR102310821B1 (ko) 타깃 셀 액세스 방법 및 장치
EP3737126B1 (fr) Procédé de communication, et appareil de communication
EP4072234A1 (fr) Procédé permettant d'établir une connexion et d'obtenir un code de service de relais et appareil de communication
US20220408162A1 (en) Multicast service transmission method and apparatus
US20230029714A1 (en) Authorization method, policy control function device, and access and mobility management function device
US20220272607A1 (en) Network Access Method and Communication Apparatus
WO2020221223A1 (fr) Procédé, appareil et système de communication
US20230224770A1 (en) Communication method and apparatus
EP4221005A1 (fr) Procédé de transmission par trajets multiples et appareil de communication
WO2019037500A1 (fr) Procédé et appareil de sélection de dispositif de réseau d'accès radio
US20230262793A1 (en) Method for communication between user terminal and network, and terminal, network device and apparatus
EP4354770A1 (fr) Procédé et appareil de transmission de données
EP4185009A1 (fr) Procédé, appareil et système d'acheminement de paquets
US20230422016A1 (en) Network access method and apparatus
US20230232196A1 (en) Data communication method and communication apparatus
CN116097751A (zh) 利用smf重新选择来重新锚定
US20240244497A1 (en) Communication method and apparatus
US20230388756A1 (en) Communication method and apparatus for multicast/broadcast service
WO2023020481A1 (fr) Procédé de transmission de données et appareil
WO2023024931A1 (fr) Procédé et appareil de communication entre dispositifs
WO2022237857A1 (fr) Procédé de détermination de mode d'activation de protection de sécurité, procédé de communication et appareil de communication
US20240292219A1 (en) Method and device for operating terminal in wireless communication system
WO2022148469A1 (fr) Procédé, appareil et système de protection de sécurité
WO2022170798A1 (fr) Procédé de détermination de stratégie et appareil de communication

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20220406

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RIC1 Information provided on ipc code assigned before grant

Ipc: H04W 48/04 20090101ALN20220929BHEP

Ipc: H04W 40/20 20090101ALI20220929BHEP

Ipc: H04W 24/02 20090101AFI20220929BHEP

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20230104

RIC1 Information provided on ipc code assigned before grant

Ipc: H04W 48/04 20090101ALN20221222BHEP

Ipc: H04W 40/20 20090101ALI20221222BHEP

Ipc: H04W 24/02 20090101AFI20221222BHEP